Open Source Intelligence (OSINT) gathering applies to not only companies but to employees as well. This course will teach you how to gather various forms of employee OSINT, including historical, social, mobile, and physical information.
As organizations focus their efforts on protecting their technical infrastructure, far too many leave their most vulnerable assets exposed to attack: their people. In this course, Performing OSINT Gathering on Employee Targets, you will gain the ability to gather and analyze OSINT related to an organization’s workforce members. First, you will learn useful tools and techniques for collecting employee OSINT. Next, you will analyze your data, extracting information that might hold value to an attacker. Finally, you will explore how to incorporate your findings into preparing social engineering attacks. When you’re finished with this course, you will have the skills and knowledge of employee OSINT gathering needed to conduct an effective, worthwhile penetration test, and to help the target organization better understand how to protect their employees.
Course Overview Hi everyone. My name is Jerod Brennen, and welcome to my course on Performing OSINT Gathering on Employee Targets. I'm a security architect advisor, speaker, and teacher with roughly two decades of information security experience under my belt, and I want to share what I've learned in that time with folks like you. In this course, we're going to explore tools and techniques that you can use during a penetration test to collect and analyze open-source intelligence on employee targets. In my experience, organizations focus their efforts on protecting their technical infrastructure with far too many of them leaving their most vulnerable assets exposed to attack, their people. Some of the major topics that we're going to cover include performing social network analysis, identifying the target's internet presence, gathering physical location information, and assessing the target's mobile footprint. By the end of this course, you'll know which tools you can turn to for collecting employee OSINT, how to use those tools to find the information you're looking for, how to analyze your results for useful information, and how to approach employee OSINT gathering in an ethical manner. Before beginning the course, you should be familiar with the penetration testing execution standard, at least at a high level. From here, you should feel comfortable diving into additional information security courses on topics like penetration testing and ethical hacking. I hope you'll join me on this journey to enhance your pen testing skills with the Performing OSINT Gathering on Employee Targets course, here on Pluralsight.